Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modeling and Simulation
Reference71 articles.
1. 5Th annual edition of cyber defense magazine - 2017 predictions;Martin,2017
2. D2.1 state of art;ATENA,2016
3. E. Morioka, M. Sharbaf, Cloud Computing: Digital Forensic Solutions, in: International Conference on Information Technology-New Generations, in: 12, Las Vegas, 2015, pp. 589–594.
4. An efficient approach to forensic investigation in cloud using VM snapshots;Rani,2015
5. Guide to integrating forensics techniques into incident response;NIST,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Networks in the Digital Age: A Review of Intrusion Detection and Prevention Strategies;International Journal of Innovative Science and Research Technology (IJISRT);2024-07-13
2. Tech-Business Analytics in Tertiary Industry Sector;International Journal of Applied Engineering and Management Letters;2023-12-31
3. Securing the Digital Supply Chain Cyber Threats and Vulnerabilities;Advances in Logistics, Operations, and Management Science;2023-12-29
4. Detecting Cyber Threats With a Graph-Based NIDPS;Advances in Logistics, Operations, and Management Science;2023-12-29
5. Risk Management and Cybersecurity in Transportation and Warehousing;Advances in Logistics, Operations, and Management Science;2023-12-29